Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
8caedd63328a99b899f3c0510f065e3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8caedd63328a99b899f3c0510f065e3f.exe
Resource
win10v2004-20231215-en
General
-
Target
8caedd63328a99b899f3c0510f065e3f.exe
-
Size
1.9MB
-
MD5
8caedd63328a99b899f3c0510f065e3f
-
SHA1
1bed83cc4095ca3ccf34060ef3fbecbb9a1937e0
-
SHA256
dd7b461ebb003ec151cfaf598c439ddef93ac5c3b4c4d27a0038c58f0f79550f
-
SHA512
644ff8d7279464ba6e26938d13d072ebab8b04eb82f74ff59fd2b0a38f3f701500fd2ae5169795f0d7b0eade70fd10016a7c93318d953e5f3a508df95de88f07
-
SSDEEP
49152:Qoa1taC070dGsvc6Pk2nX1RNO0ocDc/rAOpmStz16kIAx:Qoa1taC0Xsg2nlRpoN1/19Ik
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 8862.tmp -
Executes dropped EXE 1 IoCs
pid Process 2700 8862.tmp -
Loads dropped DLL 1 IoCs
pid Process 2744 8caedd63328a99b899f3c0510f065e3f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2700 2744 8caedd63328a99b899f3c0510f065e3f.exe 28 PID 2744 wrote to memory of 2700 2744 8caedd63328a99b899f3c0510f065e3f.exe 28 PID 2744 wrote to memory of 2700 2744 8caedd63328a99b899f3c0510f065e3f.exe 28 PID 2744 wrote to memory of 2700 2744 8caedd63328a99b899f3c0510f065e3f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8caedd63328a99b899f3c0510f065e3f.exe"C:\Users\Admin\AppData\Local\Temp\8caedd63328a99b899f3c0510f065e3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\8862.tmp"C:\Users\Admin\AppData\Local\Temp\8862.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8caedd63328a99b899f3c0510f065e3f.exe A455844FEAB5F81A039744D7009C9FB1CC79DB1F5A3C954E883797CCC9C898ACE09F6C103F0127CE8A3D3A838A85144EFCDE32703F71BA2C8C8EC70CDC04AC402⤵
- Deletes itself
- Executes dropped EXE
PID:2700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5fd60672214aa4889f0249b45e4c08bf9
SHA15c85076bc69517d041f618a7e9833f4ca2c9382f
SHA256c5b4fea851248cc80ace0bc4340d02a22769fec067cfefdbb1249f2bd351ea8b
SHA512edfc9c87f7f7ea8e529efe4f47e4266c016d98ada85f03f51ad8c240a8da3db8053f3d217eba4d98cffb2f31f0be2ad0c1d685ea0b143a4fe27f417fe9b8339c